Social Engineering

Focal Point offers both physical and electronic social engineering to test the human elements of your security program, evaluating the real-world security of your physical systems and employees.

Electronic Social Engineering

An electronic social engineering assessment tests the security awareness of your employees by enticing them to provide access to sensitive information or company resources. Social engineering identifies critical risk factors through different communication scenarios, including email and phone interactions. Our final report provides an outline of your overall security awareness, as well as a detailed technical report including all specific vulnerabilities, severity of exploits, and suggested remediation efforts.

Different from the Rest

Customized Assessment

We don't choose our social engineering strategies from a set list. Our team tailors our approach to your needs, industry, and unique threat landscape to really put your team to the test.

On the Field

Our team is in the field daily researching new testing techniques and identifying changing threats. They bring this experience to your projects, uncovering even the most hard-to-detect vulnerabilities.

Best of Both Worlds

Our team members are equally skilled at physical and electronic social engineering tactics. If needed, they can provide a hybrid assessment, providing a more complete picture of your security posture.

Let's Chat

Ready to Get Started?

Focal Point is excited to take on your biggest data risk challenges. If you'd like to speak to a Focal Point expert or inquire about our services, please fill out the following form.

Physical Breach Assessment

Physical security is your first line of defense against malicious actors, including disgruntled employees and those engaged in corporate espionage. Our team surveys your physical location, gathering open source intelligence that can be used to profile the target. We then attempt to identify physical vulnerabilities through lock picking, media drops, impersonation, and other control exploits. Our final report provides complete visibility into your physical security, with risk ratings for each vulnerability.

Featured Insights

Recommended reading for those looking to explore the world of penetration testing.

Blog

Free Template: Clean Desk Policy

Physical security is a critical and sometimes overlooked aspect of cybersecurity. Security should be looked at as a holistic effort to protect important assets – from employees and hardware to customer data...

A Guide to Red and Purple Team Assessments

With persistent attackers always on the hunt for corporate data, organizations must continuously seek new, innovative ways to strengthen their cybersecurity programs. Red team and purple team assessments are...